Wikipedia:Reference desk/Computing

From Wikipedia, the free encyclopedia
Jump to: navigation, search

The Wikipedia Reference Desk covering the topic of computing.

Welcome to the computing reference desk.
Want a faster answer?

Main page: Help searching Wikipedia

How can I get my question answered?

  • Provide a short header that gives the general topic of the question.
  • Type ~~~~ (four tildes) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Post your question to only one desk.
  • Don't post personal contact information – it will be removed. We'll answer here within a few days.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we’ll help you past the stuck point.

How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:
Help desk
Village pump
Help manual

May 1[edit]

The ultimate Antivirus[edit]

Hi there,
Of course I am speaking about theoretical one, but still I do have some questions about it.
Because in a file with a size of k, can be only maximum of 2^k potential distinct programs, an antivirus with roughly the second volume should detect ultimately between to a virus to a non-virus.
Assuming that most of the viruses behave the same,and the computing technologies grows exponentially, leading to the ultimate question, will ever be an antivirus, that will distinguish the whole viruses up to a certain volume or beyond? — Preceding unsigned comment added by Exx8 (talkcontribs) 14:15, 1 May 2015 (UTC)

So, let's imagine that programs are at most 1 megabyte long...that's VERY conservative...1Mbyte = 8Mbits, so there are 28,000,000 programs of that length for your antivirus to keep track of. Sadly, there are only around 2100 fundamental particles in the known there isn't remotely any possibility of doing what you say. Worse still, the time it would take to read the 2100th bit of that enormous memory would be a few billion years. Worse still, you're going to suffer from the Halting can't write a program to determine whether another program halts or not in a finite amount of time...and for the same reason, you can't write a program that'll determine whether some other program will eventually do something undesirable. So you simply can't look at an arbitrary program with any conceivable tool and decide whether it's a virus or not. It's flat out impossible.
Hence, the answer is "No"...not in practice, not even in theory, not even as a 'thought experiment'.
Worse still, most viruses do things like writing self-modifying code - and downloading data from external sources such as the Internet. So the static appearance of a virus could be no different than (say) a web browser - and only becomes evil when the data it reads from someplace in (say) Russia, China or Nigeria turns out to be in some way evil. I could easily write a program that seems entirely benign against every conceivable test - until the data table it grabs from some remote server changes and it suddenly turns evil. No static test can discover that. There are other variations too - a situation where programs A and B are each entirely benign until both of them are installed at once, and then the interactions between them becomes evil.
SteveBaker (talk) 04:17, 2 May 2015 (UTC)

Can one plug a microphone in the headphone jack of an iPhone 3gs and record with it?[edit]

If I plugged a high quality condenser mic with a compatible 3.5mm jack into the headphones port of an iPhone 3gs and started recording with the Voice Memos app that comes with it in the Utilities folder along with Calculator etc., would the recorder take the input coming from the microphone? (talk) 15:02, 1 May 2015 (UTC)

The trick is the "compatible" part. My understanding is that not necessarily any 3.5mm jacked mic would work. The 3gs has a jack that is designed to send left/right audio, and capture mono audio all from a mic, all in the same jack. So if you had a headset with a 3.5mm jack, I'm confident it would work. For a mic only, it's less clear. I would just try it and see, you are unlikely to hurt anything. SemanticMantis (talk) 15:45, 1 May 2015 (UTC)
Note: Try by keeping the mic volume low. The input and output may create an effect. Always remember, the output should always be twice/ten times more than the input. -- Mr. Prophet (talk) 18:46, 1 May 2015 (UTC)
There should be adaptors to split a 4-way headphone/mic connector to separate headphone/mic connectors. If you know one end of a soldering iron from the other, they aren't difficult to make. LongHairedFop (talk) 12:43, 2 May 2015 (UTC)
The Iphone heaset socket pinout is, from tip to base: left audio out, right audio out, ground, microphone. See this image - -- Roger (Dodger67) (talk) 13:55, 6 May 2015 (UTC)

Email addresses' peculiarities[edit]

Why are /,=, !, spaces, and even @ (if double brackets are used) allowed in names of email users? Why weren't emails limited to alphanumeric ASCII characters, periods and hyphens? Does anyone needs these symbols? How common are they anyway? I don't have any email containing those symbols in my address book. Couldn't they have implemented the same restrictions to user names that are valid for URL names? --Bickeyboard (talk) 15:29, 1 May 2015 (UTC)

An important thing to remember about "internet" email is that it didn't start with a clean slate. It had to interconnect existing systems (using a variety of environments) and run over existing networks (using a variety of addressing schemes). It wasn't just unix(alike) things talking to one another over TCP/IP with DNS names. If memory serves, UUCPmail addresses could look like foo!bar!buz, and VMS usernames could be something like JENNY::GEOLOGY. The greybeards of the early Internet didn't get to just impose a canonical format, they had to work with what they had, and had to worry about how to unambiguously translate one wacky format into another, and back again. Email address#Validation and verification still bears the scars of this enforced flexibility, like an over-ambitious yoga student. -- Finlay McWalterTalk 15:51, 1 May 2015 (UTC)
I like that analogy. I may have to steal that sometime. Matt Deres (talk) 12:18, 2 May 2015 (UTC)
Also keep in mind that the A in ASCII stands for American. If your name was Θεόδωρος Αγγελόπουλος or Влади́мир Кра́мник or 郭晶晶, or even Ólafur Ragnar Grímsson for that matter, you might get annoyed if you were told it had to appear in your email address in ASCII. -- (talk) 19:06, 1 May 2015 (UTC)
I don't get what you are trying to say. No matter what your name is, it has to appear in ASCII. The standard is limited to almost the whole ASCII. I was asking why is it not limited more, and excluding things like @. --Llaanngg (talk) 13:58, 2 May 2015 (UTC)
My first Net address was well! (later You may be able to guess what the bang meant there. —Tamfang (talk) 02:50, 2 May 2015 (UTC)
Yeah - maybe. Back in the very olden days, when we had some measure of networking via usenet - email had to be routed explicitly through a chain of machines using '!' as the path separator - so my email address might be: steve!mycomputer!anothercomputer!another-well-known-computer - and I'm guessing you were on the cusp of that change-over to the modern Internet approach. SteveBaker (talk) 15:11, 2 May 2015 (UTC)
See UUCP for our article on bang paths and similar historical peculiarities. Tevildo (talk) 10:04, 3 May 2015 (UTC)

microphone related[edit]

I have purchased a laptop Latitude Intel (R) Core(TM) i5-2520M 2.50 GHz. I have installed windows 8 on it. But I can not detect microphone in it. Is this series has built in mic or not. When I check its specifications on net, in front of microphone ,:Line in & out in 1, is written. what is the meaning of this, is their is only a slot for it, if so tell me the type of microphone I will use so that whole my family can talk and listen on it (talk) 19:16, 1 May 2015 (UTC)

Maybe it has an or no installed mic. The mic jack just makes you use an external mic. Check the device mananger first to see if all audio devices have drivers installed. Then check the audio mixer for muted devices, volume level settings and selected audio devices. Note, audio applications also have volume level settings. If everything is ok, google for the data sheet or product specification. If it does not provide this information, google for service manuals and pictures of your computer to identify if a internal mic is installed. --Hans Haase (有问题吗) 20:15, 1 May 2015 (UTC)
Mostlikely electret mics are used. Some computers can activate and deactivate the dc power to supply the mic. Dynamic mics often supply a to low audio level. You also may refer the audio adapters spacification. --Hans Haase (有问题吗) 20:21, 1 May 2015 (UTC)
If the above fails, you can purchase a cheap mic with a 3.5mm jack. Plug it into the port with the microphone symbol. Windows should automatically detect it. Justin15w (talk)
In case your microphone jack isn't labelled with text or a microphone symbol, it may be color coded (pink). Or, you could use the line-in jack (blue): [1]. (I read your post to say there's no built-in microphone or microphone jack, but that you can use the line-in jack instead.) StuRat (talk) 20:35, 1 May 2015 (UTC)

Pandora Console[edit]

Does any one know were I could find a Pandora gaming system? I am a calector and would love to get my hands on one of these.--Joshua griff (talk) 19:59, 1 May 2015 (UTC)

These days, "OpenPandora" systems can be bought on eBay - I see one there going for $320. is the official site, it mentions a US distributor, but the link is dead. The German distributor is at - and they are selling the handheld for 226 to 375 euro for a hand-held of various speeds - and a version that plugs into your TV for 180 to 222 euro. Bare circuit boards are 152 to 182 euro. SteveBaker (talk) 03:59, 2 May 2015 (UTC)

".local" URLs.[edit]

I have half a dozen Ubuntu linux computers on my home network - one of them is called "leonardo" and it's a BeagleBone Black that hosts a small website that I can access from other machines locally.

All of my computers can reach it via it's IP address - because my wireless router uses DHCP, that changes from time to time. However, on *SOME* of my computers, I can just point my browser to 'http://leonardo.local' and that works great. However, other machines are unable to find that address. However, on another machine, I can 'ping leonardo.local' and get a response - but whenever I type 'leonardo.local' into my browser (Chrome, for example) - I get a Google search result for those words and not access to the website?!

I have a high-end NetGear router - leonardo is connected over a wired link, some other machines are wireless, others are also wired - there doesn't seem to be a pattern there.

Any idea what's going on here?

SteveBaker (talk) 21:45, 1 May 2015 (UTC)

.local lookup can be implemented on some machines with zeroconf / bonjour. -- Finlay McWalterTalk 21:51, 1 May 2015 (UTC)
That code has to run on the machine being referred to. Under Ubuntu Linux, the "avahi-daemon" program provides the ".local" service - and it's installed by default. I don't think that's the problem because:
  1. *SOME* of the machines on the network can reach it via the .local avahi must be working.
  2. I can see that process is running if I ssh into the BeagleBone.
# ps -ef | grep avahi
avahi      433     1  0 May01 ?        00:00:01 avahi-daemon: running [leonardo.local]
avahi      434   433  0 May01 ?        00:00:00 avahi-daemon: chroot helper
The problem would seem to be in the client machines.
  • My desktop Ubuntu machine (with a wired link to the router) can ping the .local address, but can't reach it in either chrome or firefox via .local - although if I type in the IP address, I can reach it just fine.
  • A WiFi-connected Ubuntu netbook can both ping the .local URL and reach it in-browser in chrome.
  • A WiFi-connected Ubuntu laptop can neither ping *NOR* reach the .local URL in-browser, but can still reach it using it's IP address.
All three machines are running the latest Ubuntu - and are fully updated.
WTF?! SteveBaker (talk) 03:47, 2 May 2015 (UTC)
Without solving the mystery around the resolution of leonardo.local, you can solve your problem by configuring the DHCP server to always assign the same IP address to leonardo. Alternatively, you can configure leonardo to use a static (local) IP address outside the pool that the DHCP server dynamically assign to its clients. BTW, how are your machines configured to resolve leonardo.local? Do they all use the same local DNS server? -- (talk) 04:01, 2 May 2015 (UTC)
In theory, yes...but even if that was the problem, how come (on one machine) I can 'ping' the .local address but not see it in the browser? SteveBaker (talk) 15:08, 2 May 2015 (UTC)
Chrome apparently has its own DNS cache (see this reference). If leonardo's IP address had changed since Chrome last cached it, it could explain some of your observations. -- (talk) 04:13, 2 May 2015 (UTC)
Ah...that might explain how I could ping (using the default DNS) but not browse (using chromes' internal DNS cache). It's likely that leonardo's address changes every day when I power it Chrome may well have cached an old address. I tried the advice to go to chrome://net-internals/#dns and clear Chromes' internal cache. Now, instead of getting a Google search result for leonardo.local, and to throw me off into another rabbit-hole, I get a Time-Warner cable catch-all search-results page. This is especially annoying because I've gone through the process to opt-out of this "service" and still it intervenes...I've spent HOURS on the phone with TWC trying to explain that they have a bug in their system - but their customer service people are stuck on the "But why wouldn't you want that?" thing. Argh! Anyway, I don't think this is the problem because one of my machines can get to leonardo via chrome reliably. SteveBaker (talk) 15:08, 2 May 2015 (UTC)
Do you have a local DNS server set up that can resolve names in the .local domain? If you don't, I'd recommend looking into setting up one. The simplest I can think of is dnsmasq. It can serve as a DNS server and a DHCP server. It resolves names using the /etc/hosts file on the host, so the syntax for simple DNS records is very simple. For names that are not in /etc/hosts, it uses an upstream DNS server. (Disclosure: I've looked into setting up a local DNS server before and dnsmasq was the simplest solution I found, but things happened and I ended up not having to implement it, so I haven't actually used dnsmaq.) Good luck. -- (talk) 15:41, 2 May 2015 (UTC)
Regarding your ISP intercepting and redirecting failed DNS lookups to their server, that's a potential security threat. Your browsers and other HTTP clients are sending URL paths & query parameters and HTTP headers--not meant for them--to their server. If there's anything sensitive among those, it might get captured and saved on their server. You can do some experiment and find out what address(es) their DNS server returns for unresolvable domains, and block those addresses (say by configuring a router to send traffic to those addresses to a hole.) -- (talk) 16:00, 2 May 2015 (UTC)
Your router's DHCP settings might have an option to set a fixed IP address to devices based on their MAC address. When set, the device's address will not change; however a laptop might have a different address for its wired and wireless network card. If the device is connected to another network then it will have another address. The other way is to go into each device's own network settings, and assign a manual fixed address, at the top end of the DHCP range. However, this may cause problems if you connect the device to another network. LongHairedFop (talk) 12:41, 2 May 2015 (UTC)
Yeah - that's a possibility that I'm sure would hypothetically work - but for various complicated reasons, I don't want to do that...I actually *NEED* the .local address. (leonardo is really an embedded controller for a laser cutter...which happens to be a BeagleBone running Ubuntu linux). SteveBaker (talk) 15:08, 2 May 2015 (UTC)
Once you got that working, you can edit the /etc/hosts.txt file to give a DNS name for each IP address. LongHairedFop (talk) 17:47, 2 May 2015 (UTC)
Possibly a silly question but, in your browser, have you tried typing http://lenoardo.local/ instead of just "leonardo.local"? You only wrote "leonardo.local" in your question. Vespine (talk) 01:11, 4 May 2015 (UTC)
Nope - I tried that, adding http:// doesn't make a difference - neither does adding 'www.'. SteveBaker (talk) 05:03, 4 May 2015 (UTC)
Also, when you use a computer that DOES work, does leonardo.local redirect you to a webpage? Something like home.html or similar? If you take that whole link does it work on the computer where just leonardo.local fails? Vespine (talk) 01:14, 4 May 2015 (UTC)
Yeah - there is a Python program running that uses the 'bottle' library server code to serve up the page. Explicitly asking for index.html makes no difference...and recall that I can get to the web page with a URL of just '' (or whatever the IP address is toda). SteveBaker (talk) 05:03, 4 May 2015 (UTC)
I do this kind of thing for a living, but I support mostly windows infrastructure with DNS so not so great with the minutia of mDNS. If it were me, the next step would be install Fiddler_(software) to see what's going on. Vespine (talk) 05:33, 4 May 2015 (UTC)

May 2[edit]

Cell phone with digital magnifier ?[edit]

I'd like to have something like this for reading menus at restaurants, since I really don't like reading glasses or using a magnifying glass (I wear contact lenses, but they are for driving, not reading). My current cell phone almost does it:

1) It shows me a preview of the pic it will take.
2) After I take the pic it allows me to digitally zoom in.

What is missing is the ability to zoom in during the preview. I could get the job done by taking a series of pics and zooming in on each, but that's too much work. I've found standalone devices that do this, but they cost around $100 each. I'm hoping I can find a cell phone to do that for a lot less. So far Google hasn't helped. Any ideas ? StuRat (talk) 01:34, 2 May 2015 (UTC)

Dunno about iPhones - but Android's app store has dozens of magnifying glass applications - mine has a bunch of zoom levels lets you turn the camera flash on to provide illumination - and will take a photo for you. I can't imagine anything else you'd reasonably expect it to be able to do. The one I have ("Magnifying Glass Flashlight" by Bzing) has a free version which has adverts and is missing a few minor features - but I think it only cost $1.99 to buy it. I have no idea whether there are better ones out there - but it was the first one I downloaded and it seems perfectly OK.
There have to be iPhone apps that do the same thing.
SteveBaker (talk) 03:19, 2 May 2015 (UTC)
The standard photo app on the Samsung Galaxy S4 will zoom in and work like a magnifying glass with out taking a picture. Take a look at magnifying glasses for Android, Windows phone and Iphone. CambridgeBayWeather, Uqaqtuq (talk), Sunasuttuq 04:09, 2 May 2015 (UTC)
For Android I recommend Android Army Knife, which supports adjustable zoom and the camera flash and many other non-magnifying-glass features and is free (actually free, not creepy "free"; it doesn't need the network access permission).
...and which is apparently gone from Google Play. Great. Amazon seems to have it. -- BenRG (talk) 08:45, 2 May 2015 (UTC)
...and if you try to install it now, it actually installs the Amazon App Store application - THEN you can install the tool for $0.00 (which is actually pretty good) - but the Amazon store sticks an amazon logo permanently at the top-left of your screen. You can uninstall the Amazon App Store app...which gets rid of the logo - but now the Army Knife tool refuses to run until you re-install the Amazon app. Sure, the Army Knife app doesn't demand access to stuff it doesn't need, the Amazon store app demands EVERYTHING...stuff it definitely doesn't need to know to do it's work. So while I can recommend the Army Knife tool without reservation...the fact that Amazon now appear to own it has made it *HORRIBLE*...don't do it! It looks like the authors sold-out to Amazon...which is a shame. :-( SteveBaker (talk) 14:33, 2 May 2015 (UTC)
I suspect most stock camera apps on smart phones allow this. If yours doesn't make sure you aren't trying to take photos at the maximum resolution of the camera. Choose the lowest resolution that will fill your screen. Nil Einne (talk) 13:43, 2 May 2015 (UTC)
Perhaps I'm missing a point here, but the iPhone camera will quite happily zoom in while previewing. --jpgordon::==( o ) 21:18, 2 May 2015 (UTC)
Yeah that's what I'm saying. I think most will allow it because at a minimum, it's use by the digital zoom. The most likely reason it won't work on the stock camera app is probably not because the camera doesn't support it, but because you've set the camera to take at the maximum resolution in which case some cameras apps may not allow you to zoom because they can't digitally zoom usefully. Nil Einne (talk) 06:28, 5 May 2015 (UTC)

OK, excellent, so there are several options. Which is the cheapest phone which will do what I requested ? StuRat (talk) 05:10, 3 May 2015 (UTC)

That would be the cheapest Android phone the case of phones, "cheapest" gets all wrapped up in the cellular plan you choose. With a few years of commitment, you can get a really nice phone for $0. But you're paying for it in increased phone bills. There is middle ground, where the phone is cheaper and the commitment smaller, or you can get an unlocked phone with no commitment. You might also want to consider buying a used (unlocked) phone if this is all you want it for. You could also consider getting a cheap android tablet instead - the larger screen buying you more magnification...and no cellular bill!
The cheapest new, unlocked phone that I know of is THIS ONE at $58...but it's a vast and fast-changing market. SteveBaker (talk) 22:40, 3 May 2015 (UTC)
I was hoping I could buy a cheap cell phone and never activate it, just use it as a magnifier (utilizing built-in software). I already have another cell phone like that I use as an alarm clock, but alas with no camera. StuRat (talk) 19:24, 4 May 2015 (UTC)
I could buy Android phones for NZ$50 during christmas time and I think I probably still can if I wait

I found one for -$20 ! Yes, that's negative $20. It's a reconditioned LG Optimus Dynamic, free when bundled with a 1 year TracFone card, which I needed anyway for my current phone. And I had a $20 off promo code for the bundle. StuRat (talk) 20:07, 5 May 2015 (UTC)

Backup Windows 7 settings[edit]

I installed Windows 7 and spent hours setting it up just so. I don't want to go through all that work again when it comes to reinstalling the OS. Is there any way to backup all of the changes I made right down to the smallest nuance and then restore them onto a clean install of Windows 7? I gather most of the changes reside within the "registry", is that true? I changed UI settings, port settings, sound settings, group policies, account control settings, disabled various services, etc. I want all these changes to be able to bring over to new computer. Thank you! — Preceding unsigned comment added by (talk) 11:02, 2 May 2015 (UTC)

The new computer has other hardware. Some commercial software for disk images support to restore on different hardware. When using same or newer windows version, reinstall all software on the new computer and google for Migwiz to migrate your files, profiles and settings. --Hans Haase (有问题吗) 12:13, 2 May 2015 (UTC)

How can I listen to the music on this CD?[edit]

My friend gave me a CD with music his band made (I'm not pirating anything, don't worry). But he gave it to me in a weird, un-listenable format. Here's what the CD looks like when opened. I can't listen to the songs with either VLC or Window Media Player, and I don't appear capable of transferring them to my Desktop. What should I do so I can listen to these songs? (talk) 22:57, 2 May 2015 (UTC)

It looks like he was making an audio CD and didn't close the project to finish it off. So, he needs to put it back in his computer, open the project, and then close it. (talk) 23:05, 2 May 2015 (UTC)
Is there any way for me to do that last step instead of him? He lives on the other side of the country. (talk) 23:24, 2 May 2015 (UTC)
In Windows, if you go to Computer and open an actual audio CD, you'll see files of type "CD Audio Track" (.cda files), but these are just fake shortcut files that Windows shows you. If you open these files from the actual CD, a media player can start playing the track from the CD. But if you copy these files to another location, they don't work. When your friend made this CD, maybe they only copied the .cda files. If so, they'll need to make a new CD for you using a program that has the ability to copy audio CDs. --Bavi H (talk) 00:47, 3 May 2015 (UTC)
The size of the folder (174 bytes) makes me think that you are correct. The dates (1994) back that up; if it was a proper CD burn, those would be new track files with recent dates; copied .CDA files would keep their old dates. Matt Deres (talk) 21:15, 3 May 2015 (UTC)
Actually, if it were a properly burned audio CD, the cda files would still have the same date. When you "Open" an audio CD in Windows, Windows shows you an emulated folder of cda files that always have the same date: 00:00 UT on Jan 1, 1995. --Bavi H (talk) 23:58, 3 May 2015 (UTC)
It looks to me like he only copied the .cda files, since the disc has a volume label ("Ryans Music"), and a real audio CD wouldn't. -- BenRG (talk) 20:01, 5 May 2015 (UTC)
Ask your friend to either re-copy the CD and post it to you, or rip the CD to MP3 format and e-mail the files. Dbfirs 19:52, 3 May 2015 (UTC)
CD's are so last century. Your friend should be using something like This will give him exposure as well. Sandman1142 (talk) 11:54, 6 May 2015 (UTC)

May 3[edit]

registry changes[edit]

In Windows 7, how do I export ONLY user-modified registry changes (ie not the default registry entries but only the ones the user has modified)? Thanks! (talk) 11:32, 3 May 2015 (UTC)

The user settings are contained in the files NTUSER.dat and UsrClass.dat, but it is not recommended to do anything with those files directly. Some registry backup software allows import and export of separate sections, but I'll leave it to experts to recommend the best. Dbfirs 19:37, 3 May 2015 (UTC)
I don't think the Windows registry even keeps track of changes. Registry keys have a modification date associated with them (no creation or last access dates though, like files have), but that's it. You could export the registry into a text file and diff it with an earlier copy, but that will only tell what has changed since that earlier copy, not what entries (keys) have assumed non-default values. Asmrulz (talk) 18:50, 5 May 2015 (UTC)

Google reviews truncated[edit]

Google reviews always truncated long reviews and had a "more" button to see the rest, but now when I hit that button it only gives me a bit more and still truncates. There's no "even more" button. For an example, see the review by "kefefs" for the Macaroni Grill in Livonia, MI. Does everyone else get the same behavior ? (If it was just the one review I might think the review actually ended with "..." but there are several.) StuRat (talk) 19:05, 3 May 2015 (UTC)

I don't know, but they show the first 993 characters of the kefefs review, not including the ending ellipsis. Similarly, the "Willie Stylez" review and one of the "A Google User" reviews were truncated to 993 and 994 characters, respectively. Maybe they have changed to a 1,000-character limit? ―Mandruss  19:11, 3 May 2015 (UTC)
Yea, it looks like they may have shortened the review size allowed, and they don't even grandfather in the old, longer reviews, they just truncate them. When adding a new review it doesn't tell you there's a size limit, although it does tell you it's too long, but not by how much. So, you have to just keep shortening it, trying again, and hoping it's short enough now. I would expect Google reviews to work better than this. StuRat (talk) 20:17, 3 May 2015 (UTC)

Is there any movie prototyping software?[edit]

Let's say I want to make a movie prototype for presentation. And I do not draw. Looking at the modern achievements of 3D-graphics and character creation capabilities (role playing games such as Skyrim), I am surprised that I couldn't find software that would allow simple methods to create a prototype of a movie scene or the whole movie.

I do not mean 3D-editors like Maya, where you want to draw meticulously every little detail. I imagine some simple system, which will allow creating a simple scene in a few minutes. For example, I select scenery ("urban landscape"), some character ("man"), set his actions ("running") and choose the location and movement of the camera.

Sly G (talk) 22:01, 3 May 2015 (UTC)

I think that you're talking about Storyboarding. In general, this can be done in any software where you can sketch - or (what most people do) just sketch on paper and scan the resulting sketches into a computer. Some storyboarding is done with 3D graphics - just very crudely (it's called an animatic) - and sometimes it's an assembly of different techniques. I've seen some people do it by 'stealing' still images and/or short video clips from existing movies and editing them together to sketch out the action (a 'photomatic' or 'moviematic')! A related trick is called a 'paint-over' where someone takes a photograph of a real place in present day, then sketches over the top of it to 'convert' it into some ancient or futuristic scene - keeping the proper perspective and scale from the original picture. I don't think there is any "One True Way" to do this - everyone seems to use whatever they are most comfortable with. SteveBaker (talk) 22:28, 3 May 2015 (UTC)

SteveBaker, Sly G: Software names guys, what are the softwares? What softwares are capable of performing such work? -- Mr. Prophet (talk) 09:07, 5 May 2015 (UTC)

Toon Boom Studio is a good option. There are also online storyboarding tools you can try.--Joseph 10:50, 5 May 2015 (UTC)
No, internet usage is a problem, thank you. -- Mr. Prophet (talk) 19:05, 5 May 2015 (UTC)

Deleting accounts on Best Daily[edit]

How does someone delete their account on the website Best Daily? — Preceding unsigned comment added by Nedlivingathome (talkcontribs) 22:16, 3 May 2015 (UTC)

Added a title to this question SteveBaker (talk) 22:32, 3 May 2015 (UTC)

Gmail will not "Send as" while using in Quickbooks[edit]


I have set up my Gmail account to "Send As" another address, ie: "something(at)". This works perfectly when using gmail via the web @ However, i am wanting this to also work using third party applications, such as Quickbooks. It did work for a while, i set port 465 SSL on Quickbooks, and even though i sent an invoice THROUGH my gmail account, it would show up as from "something(at)". This has since goofed up and it is showing as coming from my gmail address now. How can i fix this? (talk) 23:06, 3 May 2015 (UTC)

What you are describing is called E-mail spoofing. Gmail broke the feature last year on purpose. I don't believe it's possible anymore. Vespine (talk) 23:27, 3 May 2015 (UTC)

I'm not sure if this is completely correct. Am i spoofing just because i want to "Send As" an account i own? After all, Gmail allows "Send As", and i have to acknowledge that i own the other account in order for it to work. If it is the case that Google has disabled "Send As" if their SMTP server is used, i wonder why it did work for a while a week ago. Is there a way around this that is "Safe and Secure" in the way that Google needs?

I am not trying to spoof or do anything malicious in any way. I just want the benefit of sending through my specialized domain name email, but combine that with gmail's amazing organizational layout (Labels, etc) (talk) 23:57, 3 May 2015 (UTC)

Email spoofing does have a negative connotation, but it is not "malicious" in and of it self. It basically just means send email from an address different to the authorized domain of the mail server you are using. It used to be fairly common practice, because mail servers didn't "care" what address was on the 'from field'. There is a "legitimate use" section in our article. However, controling spam and email security have become more and more important to the point where now they outweigh the "convenience" of spoofing. I still use my own domain email from the webclient, but this article makes it sound like gmail can send email through the other email addresses mail server for you, but not through google's mail servers. Vespine (talk) 02:29, 4 May 2015 (UTC)

Okay, looking at your link, i am using the top option (I don't have gmail for business). If i understand correctly, and GMail will access another email and "Send As" from that emails account, why wont this work? Yes im connecting to Gmail's SMTP, but shouldnt it say "Oh, whenever email is sent from this GMail, log into the users other account and actually send from THERE instead!" ? Again, im not sure why that idea shouldnt work. It seems like it ought to, since GMail has full support for this if you use directly. Why not in SMTP?

I'm sorry if this seems confused and slightly circular, but its because i AM confused, and i dont understand why there isnt a way to make this work, since google verifies im the owner of the account and can log in AS that acct anyway. Google has all the SMTP details of the other account, so how can i get it to forward properly? (talk) 07:23, 4 May 2015 (UTC)

The key part in the article I linked is Your other email provider has to provide authenticated SMTP support for you to use this option. . I believe Gmail will use the other smtp server to send the email. The idea "could" work, but google have disabled it. Also read the Once you're set up: sending mail section. Vespine (talk) 23:19, 4 May 2015 (UTC)

May 4[edit]


I want to turn an old computer into a "Network Attached Storage"

What software would let me do this and doesn't need a screen or a keyboard attached to the computer? Basically, I start it up and it goes without any interaction or set-up. That's what I want.

I looked into "NAS4Free" it has a live cd, can I just put that into a computer without a keyboard or screen and it will set-up and be connectable via ethernet? — Preceding unsigned comment added by Name155545 (talkcontribs) 16:51, 4 May 2015 (UTC)

You'll need to check the machine's BIOS and make sure that the "Halt on Error" settings don't include one for keyboard not present. - X201 (talk) 17:00, 4 May 2015 (UTC)
I tried to give a detailed reply, but it was blocked as offensive, likely because I mentioned that operating system that begins with an L and looks like a lot like Unix. If you install that OS, you can use NFS and/or Samba to make a NAS. Use of a keyboard/mouse is computer dependent, not OS dependent. You can SSH into the machine from another computer easily. (talk) 19:27, 4 May 2015 (UTC)
The word " Linux " isn't on the keyword blacklist. However, a lot of URLs are, espically if you're an anonymous, or non-autoconfirmed user. LongHairedFop (talk) 18:02, 5 May 2015 (UTC)
NAS4Free is a UNIX port. I am booting it from a CompactFlash, but you can do it from CD. I had to do a bit of network configuration, so you will need the keyboard/mouse for setup. I'm going to try OpenMediaVault on my next NAS project. -- Gadget850 talk 10:59, 5 May 2015 (UTC)

Wanted: ancient Mac game[edit]

Hello all,

maybe one of you can help me - I'm searching for an old Mac game, must be >15y ago... basically you had a pixel-graphic 2d map, could place rails on it and let locomotives roll on these rails. All 2d and very simple, and I don't know anything except that this was an (at the time already) old Mac. Can anyone remember what game this could have been? (talk) 19:03, 4 May 2015 (UTC)

Railroad Tycoon was published in 1990, and was also released for Macintosh. Perhaps you would recognize it by browsing some screenshots at MobyGames. Nimur (talk) 19:12, 4 May 2015 (UTC)
You Know That Show on TV Tropes is another resource designed for questions like this, perhaps they can help. --Ye Olde Luke (talk) 21:53, 4 May 2015 (UTC)
Transport Tycoon is a 2D isometric graphics transport infrastructure simulation game which was released in 1994, with the Deluxe edition released in 1995. OpenTTD is the royalty-free open source re-creation. Mattmill30 (talk) 13:47, 6 May 2015 (UTC)

Math behind a page turner effect library[edit]

What math hides behind a page turner effects library? That is, those simulation that a pdf, djvu or whatever is paper, and you can see as a page of a book being turned. How do they calculate how the picture gets bended? --Llaanngg (talk) 19:15, 4 May 2015 (UTC)

It is a type of logarithmic bend. For simplicity, it likely uses a 1/n distribution of widths. The page is cut in half. Then, one half of that is cut in half. Then, 1/2 of that is cut in half. You shrink each slice until all slices have a width of zero. (talk) 19:31, 4 May 2015 (UTC)
There are lots of jQuery plugins that implement this sort of behaviour, with varying degrees of sophistication, and most of these make their un-minified source available, so if you can read JavaScript you can (in theory) see how it's done. AndrewWTaylor (talk) 12:09, 6 May 2015 (UTC)

Can data be retrieved after a natural disaster?[edit]

Say there is an office building with hundreds of computers, all belonging to the company. Now, an earthquake or hurricane strikes, and it completely demolishes the office building. Is there a way to retrieve lost data due to destroyed hardware? How can such a catastrophe be prevented? (talk) 19:58, 4 May 2015 (UTC)

Yes, wise companies keep a copy of important data on backup media that is taken off-site, or on distant servers where they rent space. If the company keeps all copies of their data in one building then possibly they use a fireproof safe. It is rare in professional data storage for the only copies to be on hard drives that might get destroyed in the catastrophe, but I guess it does happen to some small companies, and their only option will be to pay thousands of pounds or dollars to try to recover data from damaged drives. Sometimes this is possible if the damage is not too serious, but a good backup scheme is always better than attempted recovery after damage. Dbfirs 20:08, 4 May 2015 (UTC)
The formalized process for Information Technology is called Disaster recovery plan which is part of the wider Business continuity planning. Those articles have loads of info for you to start with. Vespine (talk) 23:02, 4 May 2015 (UTC)
It is often possible to recover some data from badly damaged hardware—see data recovery. -- BenRG (talk) 06:27, 5 May 2015 (UTC)
Note: data recovery services are pretty expensive, much more expensive than a decent back-up plan. It also won't recover all your data. Indeed, it might not recover anything at all. At a time of cheap cloud storage options, I don't see why a company would have valuable data all in one place. --Llaanngg (talk) 18:49, 5 May 2015 (UTC)
Indeed. Even my wife, who owns and is the sole employee of her own company, has not only an on-site backup but an off-site cloud backup of her data as well. At a few dollars a month, it's easier to budget for than the potentially thousands of dollars that recovery might require. Cloud backups are no longer only affordable to large companies. Dismas|(talk) 03:00, 6 May 2015 (UTC)

Cold call "charities" using voice recognition[edit]

I've started getting these recently. They pretend to be a human at the other end. They ask yes and no questions and once they get you to agree to a "donation" amount, they take down your address to send you an envelope. Not sure if they are a scam or not, but pretending to be a human is inherently dishonest, so I ignore them. I even said to one "You're a machine aren't you ?" and it responded with "No, what makes you think I'm a machine ?". I then asked it to multiply 2×3 and it couldn't, which either proves it's a machine or a product of the public school system. :-)

Do we have an article on this ? StuRat (talk) 20:44, 4 May 2015 (UTC)

Voice-based marketing automation and Interactive voice response. --Mark viking (talk) 22:11, 4 May 2015 (UTC)

How does someone get rid of their account on the website Best Daily?[edit]

— Preceding unsigned comment added by Nedlivingathome (talkcontribs) 22:34, 4 May 2015 (UTC)

@Nedlivingathome: The first time that you asked this question is visible just a few scrolls of the page up from this asking. And it seems that neither time has anyone known the answer. As far as I can tell, you might be asking about a British tabloid magazine but I'm not sure. That said, the answer to these types of questions is usually to contact the web site in question since they know their policies the best. Dismas|(talk) 08:50, 5 May 2015 (UTC)

May 5[edit]

Is there a Lightning to USB-C cable yet?[edit]

This review[2] says that: "The problem in one sentence: it is impossible to buy a cable, from Apple or otherwise, that let’s you plug an iPhone 6+ into the Macbook." Is this true? Is there really no Lightning to USB-C cable in the world? I googled around and can't seem to find any. WinterWall (talk) 02:00, 5 May 2015 (UTC)

That type of situation tends to change rapidly. The article is dated today (or yesterday, depending on your time zone), so you might want to keep checking every week or so. StuRat (talk) 02:25, 5 May 2015 (UTC)

How could I protect my folders and files in external storage?[edit]

Hi, I need to know a few things in-order to protect the files and folders in Windows.

  1. How could I protect the files and folders from accidental deletion?
  2. How could I protect the files and folders with password other than encryption? Please suggest some good and free tools for this.

--Joseph 10:42, 5 May 2015 (UTC)

different ways that a processor can access data are referred to as — Preceding unsigned comment added by (talk) 11:10, 5 May 2015 (UTC)

For point #1: Right click the Folder -> Properties -> Security -> Advanced -> Permissions -> Change Permissions -> <select user> -> Edit. Here you can specify (that means, deny) very detailed permissions, including delete permission.
Regarding point #2, against what do you want to protect the files? If it is to protect against access by third non-authorized people, then some strong encryption is the only way of accomplished it, per definition. You could obviously create a password protected zip or rar file, but they are known to be crackable.--Llaanngg (talk) 13:22, 5 May 2015 (UTC)
Regarding #1, how could I set it in a way that all users other than me can't delete the file. Or asking for password while attempting delete.--Joseph 17:07, 5 May 2015 (UTC)
To be clear, password protected archive files are nearly always encyrpted, just sometimes with weak encryption. I don't know if anyone ever bothered making an archive file that's protected with a meaningless password (just tells the utility 'don't do this unless someone provides the password) like exists for various document formats. Nil Einne (talk) 15:23, 5 May 2015 (UTC)
That is exactly how a lot of file security does work. That is why it is so easy to hack computers if you have physical access to them. Reboot using a separate OS (you can even pop the drives into another computer if they try to keep you from booting into another OS). Then, swap out the user password files with your own. Reboot into the main OS and the root/admin password is the one that you set. More to your point, you don't even need to do that. Just reboot into another OS and copy any file you want. User-based security does not encrypt the files. It just tells the file manager application that a password is required to open the file. A common solution to this is to encrypt the entire drive with a password required at boot. Then, if someone boots into another OS, they still need to know the drive's encryption password. (talk) 16:53, 5 May 2015 (UTC)
I haven't read everyone's comment, I'm kinda sleepy...
Dear OP, have you tried 'bitlocker' yet? not sure if it is free -- Mr. Prophet (talk) 20:20, 5 May 2015 (UTC)

Yes check.svg Done

FL Studio[edit]

Hello, I require a tutorial/step by step guide of v11.0.1, a 'basic'/'fundamental' to 'intermediate' to 'advanced' to 'mastery' guide. Can someone help me with this please. -- Mr. Prophet (talk) 20:17, 5 May 2015 (UTC)

Have you gone through this?--Joseph 05:36, 6 May 2015 (UTC)
I tried this link, it did not satisfy the complete need, however it taught the basics beautifully. I also couldn't activate the 'Blocks area', did not have it after opening the 'playlist' by 'F5'... Hope the link you provided teaches everything... Thank you -- Mr. Prophet (talk) 06:39, 6 May 2015 (UTC)

Curiosity: What is the best music making software for PC?

May 6[edit]

Android "Identity" permission[edit]

An app is asking for permission "Identity", explained as "Uses one or more of: accounts on the device, profile data". Does anyone know what this actually means? "Uses" to do what (potentially)? And what is "profile data"? — Preceding unsigned comment added by (talk) 01:32, 6 May 2015 (UTC)

Profile data, I would assume, would be things like your name, email address, and potentially your location. Dismas|(talk) 02:57, 6 May 2015 (UTC)

Intel Inside[edit]

This is probably unanswerable, but: I wonder how much it costs Apple not to clutter their computers with garish little "Intel Inside" stickers? (I presume Intel pays, i.e. offers discounts to, other computer manufacturers for the privilege. I don't presume, but rather I know, that it would obviously be out of the question for Apple!) —Steve Summit (talk) 02:39, 6 May 2015 (UTC)

I don't think Intel pays anything directly - "Intel Inside" is a cooperative marketing program. That is, qualifying products (those with an Intel CPU, with the appropriate branding on the box and in the ads) can qualify for Intel reimbursing the OEM for a share of the advertising costs they incur. There seem to be a number of levels of participation - for "track 2" they say "Track 2 participants will accrue 3% of their Net shipments of their Intel Inside Program - Track 2 Qualifying Intel Processors" (I don't know how to read that properly - I think that means 3% of the BoM cost of the Intel CPUs they're integrating, not 3% of the total BoM or 3% of the factory-gate cost). This study says "as of 1999, Intel's was investing around US$250 million a year in the Intel Inside campaign, representing 8% of total sales." -- Finlay McWalterTalk 07:47, 6 May 2015 (UTC)